Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 11
Sensitivity analysis. (a) Decrypted image by correct key. (b) Decrypted image by . (c) Decrypted image by . (d) Decrypted image by . (e) Decrypted image by . (f) Decrypted image by .
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |